• RSS
  • Twitter
  • FaceBook

Related Topics

Add White Papers

Get your company's white papers in the hands of targeted business professionals.

credit

Results 176 - 200 of 243Sort Results By: Published Date | Title | Company Name
By: Symantec     Published Date: Jan 10, 2013
The fear of fraud, spoofing, phishing, identity theft, and lax website security have a sizable percentage of consumers wary of using credit cards online. This paper examines how recent trends in Internet trust marks can restore confidence.
Tags : 
internet trust, building confidence, profit online, business profits, business growth, business confidence, consumer confidence, symantec report, security, it management
    
Symantec
By: Rapid7     Published Date: Jul 24, 2013
The Payment Card Industry (PCI) Data Security Standard (DSS) was created to confront the rising threat to credit cardholder personal information. This compliance guide will provide readers with an overview of the requirements as well as suggested steps in achieving PCI compliance.
Tags : 
rapid7, pci compliance, dss compliance, pci dss compliance, secure transactions, online payment security, security, payment processing, atm, authentication, business continuity, compliance, hacker detection, identity management, web service security
    
Rapid7
By: SAS     Published Date: Apr 25, 2017
Marketing must meet the needs of tech-savvy customers knowledgeable of brands and product information due to the rapid growth of connectivity, available information and expansion of channels. Before making a purchase decision, customers often consult more than 10 sources including social media, user reviews, online stores and brand comparisons. And, customers want to be recognized across all the platforms through which they interact with you – whether speaking to your employees on a mobile phone, tweeting at the brand or creating a shopping cart online. Similarly, you want to recognize every step of these journeys and understand the significance of each one.
Tags : 
    
SAS
By: SugarCRM     Published Date: Oct 09, 2014
BancVue is the leader in branded, community-powered banking products that help local banks and credit unions thrive in the competitive banking industry. BancVue has tripled in size in the seven years since it began to run its business on Sugar.
Tags : 
community-powered, banking product, customer intelligence, enterprise applications
    
SugarCRM
By: Brainshark     Published Date: Oct 16, 2013
Banking, insurance, securities and investment firms are challenged to keep employees, broker dealers, investors and others current in a world of constant change. Enabling video and mobile communications is the most efficient way to clearly communicate and stay ahead of competitors and changing regulations. Discover how 8 out of the top 10 US financial institutions use Brainshark communications to increase compliance, decrease risks, and lower the costs of communications.
Tags : 
finance, financial services, banking, investment, insurance, broker, credit union, banks, compliance, audit, sales, training, communications, certification, powerpoint, ppt, presentation, training video, partner training, brainshark
    
Brainshark
By: Business Software     Published Date: Apr 04, 2013
With the advent of a new globally-based economy, process manufacturers face significant challenges. Rapidly shifting markets, more empowered buyers, increasing regulation, commodity volatility, and margin pressures, and the effects of a credit crunch bring a “new normal” of constant volatility, variability, and variety to today’s landscape. In order to survive, process manufacturers need to become far more flexible, risk aware, and responsive to generate healthy revenues and profits. But above all else, they need to understand the importance of finding the right software application to drive maximum return on their investment. Business-Software.com profiles the leading process manufacturing software vendors in this white paper, download it now!
Tags : 
top 15 process, manufacturing, software vendors revealed, business-software.com, rapidly shifting markets, increasing regulation commodity
    
Business Software
By: Viavi Solutions     Published Date: Jun 30, 2014
News of recent credit card hacks has rocked consumer confidence. Even talk of a security breach can bring on a PR firestorm. What can you do to make sure your customers and clients are protected? The 12 Payment Card Industry (PCI) Data Security Standard (DSS) requirements along with the right Application Performance Monitoring (APM) solution can help keep you one step ahead of the hackers.
Tags : 
network instruments, hacks, apm, security, pci, dss, hackers, database security
    
Viavi Solutions
By: IntelliCorp     Published Date: Feb 12, 2015
Learn the basics of how to create a comprehensive and compliant background screening program that can help your organization reduce risk and promote a safe work environment.
Tags : 
background checks, background screening, employment background check, employment verification, criminal background check, education verification, drug testing, employment screening, volunteer screening, credit reports, e-verify, motor vehicle reports, fcra
    
IntelliCorp
By: Cisco     Published Date: Aug 18, 2014
Cisco continues to improve the industry's most innovative and leading data center architecture, and now makes it easy to save when you trade up to the record-setting performance of Cisco UCS M3 Blade Servers with the latest Intel® Xeon® processors. UCS Advantage* is a limited time program that allows customers with qualified HP servers and blade chassis to refresh legacy equipment and get credit toward new Cisco UCS M3 Blade Servers and infrastructure.
Tags : 
servers, data, innovative, data center, architecture, performance, processors, blade, equipment, performance testing, productivity
    
Cisco
By: Cisco     Published Date: Aug 18, 2014
Cisco continues to improve the industry's most innovative and leading data center architecture, and now makes it easy to save when you trade up to the record-setting performance of Cisco UCS M3 Blade Servers with the latest Intel® Xeon® processors. UCS Advantage* is a limited time program that allows customers with qualified Cisco UCS M1/M2 and HP servers and blade chassis to refresh legacy equipment and get credit toward new Cisco UCS M3 Blade Servers and infrastructure.
Tags : 
servers, data, innovative, data center, architecture, performance, processors, blade, equipment, data center design and management
    
Cisco
By: Symantec     Published Date: Apr 02, 2015
Trust and consumer confidence is the foundation upon which the Internet has been built. Leading commerce and financial services companies worldwide have long used Secure Socket Layer and Transport Layer Security (SSL/TLS) technologies to secure customer communications and transactions. But with the rise of Web 2.0 and social networking, people are spending more time online and logged in, and they are communicating much more than just their credit card numbers. Unfortunately, Web security practices have not always kept pace with these changes. Many organizations use the SSL/TLS protocol to encrypt the authentication process when users log in to a website, but do not encrypt subsequent pages during the user’s session. This practice is risky because it leaves website visitors vulnerable to malicious online attacks, and can result in millions of users being unknowingly exposed to threats simply by visiting a trusted website. This white paper discusses the imperative need for Always On S
Tags : 
secure socket layer, transport layer security, secure customer communications, web security, online attacks, always on ssl, security
    
Symantec
By: Total Merchant Services     Published Date: Jul 02, 2009
Accepting credit cards at your business, whether online or at your physical location, can be a challenging task.  The Credit Card Processing Industry is highly fragmented, with many companies offering conflicting or a confusing range of services.  This fact filled paper will provide you with a framework to make an informed decision for your payment system including; Equipment Costs, Rates, Types of Processing and Terms of the Agreement.
Tags : 
total merchant services, payment processing provider, credit cards
    
Total Merchant Services
By: Quantcast     Published Date: Jan 07, 2015
Attribution models assign credit to some or all of the touchpoints that contribute to a conversion—such as impressions, clicks, web searches, and website visits. Download this attribution guide today and we’ll outline some of the most common models used to measure display advertising and get to the bottom of how they may work for you.
Tags : 
marketing attribution, attribution models, impressions, web searches, display advertising
    
Quantcast
By: Symantec Corporation     Published Date: Jun 24, 2014
News headlines have been inundated with stories of massive personal and credit card data breaches. The rising intensity and sophisticated nature of cyber attacks has created a hostile and precarious environment for businesses charged with protecting their customers’ personal data. The lucrative business of selling credit card data on the black market has made point-of-sale (PoS) devices, PoS environments, and web kiosks a prime target for cybercriminals. Read this solution brief to learn how to protect your network and PoS terminal and web kiosk endpoints from costly multi-stage cyber attacks.
Tags : 
security, pos, data, malware, cyber attacks, point-of-sale, software development
    
Symantec Corporation
By: Symantec     Published Date: Dec 04, 2014
The fear of fraud, spoofing, phishing, identity theft, and lax website security have a sizeable percentage of consumers wary of using credit cards online.
Tags : 
spoofing, phishing, identity theft, lax website, cybercrime, norton, security
    
Symantec
By: AlienVault     Published Date: Mar 30, 2016
Given that Point of Sale (POS) systems are used to transmit debit and credit card information in retail transactions, it's no wonder they are a desirable target for attackers. In this white paper, you'll learn about some of the common types of POS malware, how they work and best practices for protecting cardholder data. Topics covered in this white paper include: • Common types of POS malware and how they work • How attackers exfiltrate data from POS systems once they gain access • POS security techniques to protect payment card data Download your copy today to learn how to effectively detect and respond to POS malware threats.
Tags : 
    
AlienVault
By: AdRoll     Published Date: Jul 11, 2017
Nothing is more top of mind for marketers than attribution. It’s a complex topic, and there are lots of questions. Should you measure only the first click, or the last click? Should you also measure views? Should you combine view measurement with click measurement? How long should you wait to give credit to user activity? In this whitepaper, we examine the history of attribution models and dive deep into AdRoll platform data, third-party research, and advertiser survey data to make the case for marketers to adopt a blended attribution model, one that combines both ad views and clicks. Attribution is critical to marketing success because nothing has a bigger influence on evaluating results than how you measure the impact of your advertising. And in the digital paradigm, almost everything is measurable. When we surveyed our customers, we heard this point loud and clear. Of the 1,050 marketers we spoke to in our 2016 State of the Industry Report, 84% believe attribution is critical or ver
Tags : 
attribution, adroll, performance marketing, advertising
    
AdRoll
By: Schneider Electric     Published Date: Jun 07, 2019
New digital technology now makes it feasible to integrate process control and SIF within a common automation infrastructure. While this can provide productivity and asset management benefits, if not done correctly, it can also compromise the safety and security of an industrial operation. Cybersecurity and sabotage vulnerability further accentuate the need for securing the safety instrumented system (SIS). Certainly, a common platform approach using similar hardware and software dedicated for control and safety functions, respectively, can provide the potential for cost savings. However, it is widely acknowledged that utilizing separate, independent, and diverse hardware/software for safety and control is the optimal way to protect against potentially catastrophic common cause and systematic design and application errors. Different vendors offer varied degrees of integration and solutions. The question is: how to provide an integrated control and safety solution with advanced functionality and productivity without compromising safety and security? And, where do users draw the line? A third-party (e.g., TÜV) certification of the hardware/software systems to IEC 61508 specifications carries significant advantages, but should this be the only criterion? How does a third-party certificate extend to the plant’s overall assignment of risk reduction credits for all independent protection layers (IPL)? Control system embedded safety logic solvers may actually increase the SIL requirements of the SIF if no credit is allowed for the distributed control system (DCS) as an IPL. Download the white paper to learn more.
Tags : 
smart control, empowered operators, optimized assets, future of automation, reliability, safety, cybersecurity, operational profitability, ecostruxure plant, process automation, profitable safety, defence in depth, industrial automation, process control, process systems
    
Schneider Electric
By: IBM     Published Date: Jun 11, 2008
According to Selfserviceworld.com, 50 percent of consumers prefer to use credit cards at self-checkout counters. As credit card usage continues to rise, it's beneficial for retailers to consider non-cash methods of payment. Download the white paper and see how self-checkout solutions from IBM can help increase sales and improve customer satisfaction.
Tags : 
checkout, retail, point of sale, pos, customer service, ibm, mmdg, customer satisfaction, sales automation, customer experience management
    
IBM
By: IBM     Published Date: Aug 21, 2008
In highly competitive markets, technologies that save time and money earn top consideration. Until now, XML Web Services, often touted for their ability to create business value, has been left off the short list for implementation. In this case study you’ll see how RouteOne LLC redefined the credit application process for automobile dealers and their customers using XML Web Services technologies.
Tags : 
xml, web services, ibm, ibm mi, ibm grm, software development
    
IBM
By: IBM     Published Date: Jan 12, 2009
Retail banks are in a state of transformation all over the world. They must integrate new remote payment systems, digitize process integration and update credit management. Watch this webcast to see how IBM WebSphere Portal is helping these companies deliver targeted information to support decision-making, and to aid in their transformation.
Tags : 
ibm, websphere portal banking initiative, websphere portal, portal solutions for retail banks, updating credit management, internet banking delivery, networking, it management, enterprise applications
    
IBM
By: IBM     Published Date: Nov 16, 2009
Learn how Liverpool, one of the most important retailers in Mexico, leveraged ESB messaging and enrichment to move from an inefficient, highly-complex point-to-point integration platform to a flexible SOA connectivity and integration solution that helped Liverpool reduce their costs and streamline information to customers and partners from days to seconds.
Tags : 
ibm, ebf, smart soa, connectivity infrastructure, integration platform, retail, esb messaging, infrastructure, application integration, enterprise software, service oriented architecture
    
IBM
By: netVigilance     Published Date: May 30, 2007
Bonded Sender, the world’s leading email accreditation program, increases inbox delivery at more that 35,000 domains, averaging a 21 percent improvement across accepting ISPs according to a recent Return Path study. For marketers, email deliverability translates directly to the bottom line.
Tags : 
deliverability, deliverable, undeliverable, spam filter, filter, blocking, filtering, email marketing, email content, inbox, return path, returnpath, whitelist, whitelisting, white list, sender reputation, sender score, senderscore
    
netVigilance
By: NetIQ Corporation     Published Date: Sep 04, 2007
Learn about the key challenges of PCI DSS v1.1 and how NetIQ Security Management, Configuration Control and Enterprise Administration solutions can help you demonstrate PCI compliance.
Tags : 
pci, pci dss, compliance, credit card, payment card, pci compliance, customer privacy, privacy, customer data, data privacy, data protection, net iq, netiq, cardholder, security management, change management, configuration management
    
NetIQ Corporation
Start   Previous    1 2 3 4 5 6 7 8 9 10    Next    End
Search White Papers      

Community Area

Log in | Register

Solution Center

Follow TechGenix on Twitter